ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
History

Tue, 26 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Projectsend
Projectsend projectsend
CPEs cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*
Vendors & Products Projectsend
Projectsend projectsend
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 26 Nov 2024 10:00:00 +0000

Type Values Removed Values Added
Description ProjectSend versions prior to r1720 are affected by an improper authentication vulnerability. Remote, unauthenticated attackers can exploit this flaw by sending crafted HTTP requests to options.php, enabling unauthorized modification of the application's configuration. Successful exploitation allows attackers to create accounts, upload webshells, and embed malicious JavaScript.
Title ProjectSend Unauthenticated Configuration Modification
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2024-11-26T09:55:23.588Z

Updated: 2024-11-26T14:20:14.269Z

Reserved: 2024-11-25T15:03:30.218Z

Link: CVE-2024-11680

cve-icon Vulnrichment

Updated: 2024-11-26T14:19:04.072Z

cve-icon NVD

Status : Received

Published: 2024-11-26T10:15:04.540

Modified: 2024-11-26T10:15:04.540

Link: CVE-2024-11680

cve-icon Redhat

No data.